Syrian Electronic Army attack Spreads pop-ups across News Sites

A Thanksgiving-day attack saddled several news media websites with pop-up messages promoting the Syrian Electronic Army hacking group.

Among those the attack affected were two UK newspapers, the Independent and the Telegraph, as well as CNBC, the Canadian Broadcasting Corp., and the Boston Globe. But the attack was indirect, relying on an Internet-address switcheroo involving services provided by a partner, Gigya, a startup that handles customer identity matters.

The attack was a variation on earlier Syrian Electronic Army methods. The group didn’t gain access to Gigya servers, but instead redirected its Internet traffic to its own servers. Those servers showed a pop-up message that read, “You’ve been hacked by the Syrian Electronic Army.” The Independent reported that the redirection took place after Gigya’s Domain Name System (DNS) Internet address records were altered through GoDaddy, a company that handles those matters.

Gigya on Thursday reassured customers that the issue has been resolved and no harm to actual websites was done.

“To be absolutely clear: neither Gigya’s platform itself nor any user, administrator or operational data has been compromised and was never at risk of being compromised,” Chief Executive Patrick Salyer said in a blog post.

Nevertheless, the attack, which was very visible to many users, shows the influence a hacking group can have even without getting detailed customer data. And with major attacks on companies like Target, Nieman Marcus and Home Depot fresh in mind, people have a right to be on edge.

Syrian Electronic Army attacks on Forbes and Viber resulted in the loss of some customer data. The group has concentrated on the news media, with other victims including the BBC, the New York Times, Reuters and the Onion.

“Gigya has the highest levels of security around our service and user data. We have put additional measures in place to protect against this type of attack in the future,” Salyer added.

A Twitter account apparently associated with the Syrian Electronic Army claimed credit for the attack, showing a

Read full article on CNET

Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

The Complete OSINT Tutorial to Find Personal Information About Anyone

This article mainly focuses on how to discover a person's digital footprint and gather personal data by using open-source intelligence (OSINT). So, in its...

How to find the password of hacked email addresses using OSINT

Open-source intelligence or OSINT is a potent technique, and it can give a lot of valuable information, if implemented correctly with the right strategy...

How to Identify Company’s Hacked Email Addresses Using Maltego & HaveIbeenPawned

This article is part of the Maltego OSINT tutorial, where you will learn to identify the already hacked account, and it’s password using the...

5 Key Vulnerabilities in Global Payroll

The cyber threat against payroll is growing in sophistication and frequency, according to the latest FBI cybercrime report. Many of these attacks exploit fixable...